We found results for “”
CVE-2025-53908
Good to know:
Date: July 16, 2025
RomM is a self-hosted rom manager and player. Versions prior to 3.10.3 and 4.0.0-beta.3 have an authenticated path traversal vulnerability in the "/api/raw" endpoint. Anyone running the latest version of RomM and has multiple users, even unprivileged users, such as the kiosk user in the official implementation, may be affected. This allows the leakage of passwords and users that may be stored on the system. Versions 3.10.3 and 4.0.0-beta.3 contain a patch.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Path Traversal: '/dir/../filename'
CWE-26Top Fix
Upgrade Version
Upgrade to version https://github.com/rommapp/romm.git - 3.10.3;https://github.com/rommapp/romm.git - 4.0.0-beta.3
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | NONE |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


